Haojin Zhu
Orcid: 0000-0001-5079-4556Affiliations:
- Shanghai Jiao Tong University, Shanghai, China
According to our database1,
Haojin Zhu
authored at least 213 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2023, "For contributions to Vehicular Networks and Internet-of-Things Security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., December, 2024
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024
Wireless Networks, Springer, ISBN: 978-3-031-57388-0, 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Secur. Saf., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Veh. Technol., August, 2023
Dataset, August, 2023
Dataset, August, 2023
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Proceedings of the 32nd USENIX Security Symposium, 2023
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Ind. Informatics, 2022
WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022
IACR Cryptol. ePrint Arch., 2022
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021
ACM Trans. Archit. Code Optim., 2021
Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks.
IEEE Internet Things J., 2021
Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021
CoRR, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Mob. Comput., 2020
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020
IEEE Internet Things J., 2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
IEEE Trans. Veh. Technol., 2019
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Peer-to-Peer Netw. Appl., 2019
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019
Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Comput. Secur., 2019
Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Mob. Comput., 2018
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Mob. Comput., 2017
Secur. Commun. Networks, 2017
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Netw. Appl., 2017
IEEE Internet Things J., 2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Fake reviews tell no tales? Dissecting click farming in content-generated social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wirel. Commun., 2015
Peer-to-Peer Netw. Appl., 2015
IEEE Netw., 2015
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Peer-to-Peer Netw. Appl., 2014
Computing, 2014
IEEE Cloud Comput., 2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9357-0, 2013
MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2013
Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks.
IEEE Trans. Emerg. Top. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc Sens. Wirel. Networks, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
IEEE Wirel. Commun., 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Commun. Mag., 2012
Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
CoRR, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs.
Proceedings of IEEE International Conference on Communications, 2011
Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing.
Proceedings of IEEE International Conference on Communications, 2011
MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
IEEE Trans. Wirel. Commun., 2010
PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks.
IEEE Trans. Wirel. Commun., 2010
An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
Comput. Networks, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Veh. Technol., 2009
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008
Int. J. Secur. Networks, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Comput. Stand. Interfaces, 2007
TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
2006
Sci. China Ser. F Inf. Sci., 2006
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Appl. Math. Comput., 2005